cse202 design and analysis of algorithms
play

CSE202: Design and Analysis of Algorithms Ragesh Jaiswal, CSE, UCSD - PowerPoint PPT Presentation

CSE202: Design and Analysis of Algorithms Ragesh Jaiswal, CSE, UCSD Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms Greedy Algorithms: One more example Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms


  1. CSE202: Design and Analysis of Algorithms Ragesh Jaiswal, CSE, UCSD Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  2. Greedy Algorithms: One more example Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  3. Greedy Algorithms Huffman coding A wants to send an email to B but wants to minimize the amount of communication (number of bits communicated). How do you encode an email into bits? ASCII: 8 bits per character Is this the best way to encode the email given that the goal is to minimize the amount of communication? Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  4. Greedy Algorithms Huffman coding A wants to send an email to B but wants to minimize the amount of communication (number of bits communicated). How do you encode an email into bits? ASCII: 8 bits per character Is this the best way to encode the email given that the goal is to minimize the amount of communication? Different alphabets have different frequency of occurrence in a standard English document. Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  5. Greedy Algorithms Huffman coding A wants to send an email to B but wants to minimize the amount of communication (number of bits communicated). How do you encode an email into bits? ASCII: 8 bits per character Is this the best way to encode the email given that the goal is to minimize the amount of communication? Different alphabets have different frequency of occurrence in a standard English document. Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  6. Greedy Algorithms Huffman coding The encoding of “e” should be shorter than the encoding of “x”. In fact, Morse code was designed with this in mind. Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  7. Greedy Algorithms Huffman coding Suppose you receive the following Morse code from your friend: • • •− What is the message? Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  8. Greedy Algorithms Huffman coding Prefix-free encoding: An encoding f is called prefix-free if for any pair of alphabets ( a 1 , a 2 ), f ( a 1 ) is not a prefix of f ( a 2 ). Morse code is certainly not prefix-free. Consider a binary tree with 26 leaves and associate each alphabet with a leaf in this tree. Binary tree: A rooted tree where each non-leaf node has at most two children. Label an edge 0 if this edge connects the parent to its left child and 1 otherwise. f ( x ) = The label of edges connecting the root with x . Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  9. Greedy Algorithms Huffman coding Consider a binary tree with 26 leaves and associate each alphabet with a leaf in this tree. Binary tree: A rooted tree where each non-leaf node has at most two children. Label an edge 0 if this edge connects the parent to its left child and 1 otherwise. f ( x ) = The label of edges connecting the root with x . f ( a ) = 01 , f ( b ) = 000 , f ( c ) = 101 , f ( d ) = 111. Is f prefix-free? Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  10. Greedy Algorithms Huffman coding Suppose you are given a prefix-free encoding g . Can you construct a binary tree with 26 leaves, associate each leaf with an alphabet, and label the edges as defined previously such that for any alphabet, the label of edges connecting the root with x = g ( x )? For example: g ( a ) = 0 , g ( b ) = 11 , g ( c ) = 101 , g ( d ) = 100. Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  11. Greedy Algorithms Huffman coding Suppose you are given a prefix-free encoding g . Can you construct a binary tree with 26 leaves, associate each leaf with an alphabet, and label the edges as defined previously such that for any alphabet, the label of edges connecting the root with x = g ( x )? For example: g ( a ) = 0 , g ( b ) = 11 , g ( c ) = 101 , g ( d ) = 100. Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  12. Greedy Algorithms Huffman coding Problem Huffman Coding: Given alphabets Σ = ( a 1 , ..., a n ) and the frequency of occurrence of alphabets ( t ( a 1 ) , ..., t ( a n )), find a prefix-free encoding f that minimizes: O f = | f ( a 1 ) | · t ( a 1 ) + | f ( a 2 ) | · t ( a 2 ) + ... + | f ( a n ) | · t ( a n ) Consider Σ = ( a , b , c , d ), t ( a ) = 0 . 6, t ( b ) = 0 . 2, t ( c ) = 0 . 1, t ( d ) = 0 . 1 and consider the prefix-free encoding given by the binary tree below: What is the value of O f for the prefix-free code given by the binary tree below? Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  13. Greedy Algorithms Huffman coding Problem Huffman Coding: Given alphabets Σ = ( a 1 , ..., a n ) and the frequency of occurrence of alphabets ( t ( a 1 ) , ..., t ( a n )), find a prefix-free encoding f that minimizes: O f = | f ( a 1 ) | · t ( a 1 ) + | f ( a 2 ) | · t ( a 2 ) + ... + | f ( a n ) | · t ( a n ) Consider Σ = ( a , b , c , d ), t ( a ) = 0 . 6, t ( b ) = 0 . 2, t ( c ) = 0 . 1, t ( d ) = 0 . 1 and consider the prefix-free encoding given by the binary tree below: What is the value of O f for the prefix-free code given by the binary tree below? Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  14. Greedy Algorithms Huffman coding Node depth: The depth of a vertex v , denoted by d ( v ), is the length of the path from root to v . Every binary tree gives a prefix-free encoding and every prefix-free encoding gives a binary tree. We will now use these properties to rephrase the previous problem in terms of binary trees and depths of leaves. Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  15. Greedy Algorithms Huffman coding Problem Huffman Coding: Given alphabets Σ = ( a 1 , ..., a n ) and the frequency of occurrence of alphabets ( t ( a 1 ) , ..., t ( a n )), find a prefix-free encoding f binary tree T with n leaves (each leaf labeled with unique alphabet) that minimizes: O f = | d ( a 1 ) | · t ( a 1 ) + | d ( a 2 ) | · t ( a 2 ) + ... + | d ( a n ) | · t ( a n ) , where d ( a i ) denotes the depth of the leaf labeled a i . What are the properties of the optimal tree T ∗ ? Claim 1: T ∗ is a complete binary tree. Complete binary tree: Every non-leaf node has exactly two children. Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  16. Greedy Algorithms Huffman coding Problem Huffman Coding: Given alphabets Σ = ( a 1 , ..., a n ) and the frequency of occurrence of alphabets ( t ( a 1 ) , ..., t ( a n )), find a prefix-free encoding f binary tree T with n leaves (each leaf labeled with unique alphabet) that minimizes: O f = | d ( a 1 ) | · t ( a 1 ) + | d ( a 2 ) | · t ( a 2 ) + ... + | d ( a n ) | · t ( a n ) , where d ( a i ) denotes the depth of the leaf labeled a i . What are the properties of optimal tree T ∗ ? Claim 1: Any T ∗ is a complete binary tree. Claim 2: Consider two alphabets x and y with least frequencies. Then x and y have maximum depth in any optimal tree T ∗ . Moreover, there is an optimal tree T ∗ where x and y are siblings. Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  17. Greedy Algorithms Huffman coding Let Ω be a new symbol not present in Σ. Consider the following ( smaller ) problem: Σ ′ = Σ − { x , y } ∪ { Ω } For all z ∈ Σ , t ′ ( z ) = t ( z ) t (Ω) = t ( x ) + t ( y ) Find an optimal binary tree for the new alphabet set Σ ′ and new frequencies t ′ . Let T ′ be any optimal binary tree for the above problem. Consider the leaf v labeled with Ω in T ′ . Consider the tree T which is the same as T ′ except that the node v has two children labeled as x and y . Claim 3: T is an optimal binary tree for the original problem. Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  18. Greedy Algorithms Huffman coding Algorithm Huffman-Tree - Let v 1 , ..., v n be the nodes each denoting an alphabet - S ← { v 1 , ..., v n } - While ( | S | > 1): - Pick two nodes x , y with least values of t ( x ) and t ( y ) - Create a new node z and set t ( z ) ← t ( x ) + t ( y ) - Set x as the left child of z and y as the right child of z - S ← S − { x , y } ∪ { z } - Return the only node in S as the root node of the Binary Tree What is the running time of the above algorithm? Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  19. Greedy Algorithms Huffman coding An example: A DNA sequence has four characters A , C , T , G and these characters appear with frequency 30%, 20%, 10%, and 40% respectively. We have to encode a sequence of length 1 million in bits. If we use two bits for each character, the encoding will use 2 million bits. How many bits will be required if we do Huffman encoding? Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  20. Course Overview Basic graph algorithms Algorithm Design Techniques: Greedy Algorithms Divide and Conquer Dynamic Programming Network Flows Computational Intractability Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  21. Divide and Conquer Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

  22. Divide and Conquer Introduction You may have already seen multiple examples of Divide and Conquer algorithms: Binary Search Merge Sort Quick Sort � n log 2 3 � Multiplying two n -bit numbers in O time. Ragesh Jaiswal, CSE, UCSD CSE202: Design and Analysis of Algorithms

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend